000 05227cam a2200565 i 4500
999 _c10563
_d10563
001 880672205
005 20201005142058.0
006 m o d
007 cr |||
008 140527r2015 ii a ob 001 0 eng
010 _a2014020190
020 _z9788126556236
035 _a(OCoLC)880672205
037 _a9144F636-2885-405B-8EC3-BC76273EF2BA
_bOverDrive, Inc.
_nhttp://www.overdrive.com
040 _aDLC
_erda
_beng
_cDLC
_dYDX
_dOCLCO
_dIDEBK
_dN$T
_dTEFOD
_dDG1
_dE7B
_dYDXCP
_dEG-NcFUE
042 _apcc
050 1 4 _aQA76.585
_b.A23 2014
072 7 _aCOM
_x013000
_2bisacsh
072 7 _aCOM
_x014000
_2bisacsh
072 7 _aCOM
_x018000
_2bisacsh
072 7 _aCOM
_x067000
_2bisacsh
072 7 _aCOM
_x032000
_2bisacsh
072 7 _aCOM
_x037000
_2bisacsh
072 7 _aCOM
_x052000
_2bisacsh
082 0 0 _a004.6782
_223
_bA.I.C
100 1 _aAbbadi, Imad M.,
_eauthor.
245 1 0 _aCloud management and security /
_cImad M. Abbadi.
260 _aNew Delhi :
_bWiley,
_c2015.
300 _axxii, 216 pages ;
_c24 cm.
336 _atext
_2rdacontent.
337 _acomputer
_2rdamedia.
338 _aonline resource
_2rdacarrier.
500 _acomputer bookfair2016
504 _aIncludes bibliographical references and index.
505 0 _aPreface References 1 Introduction 1.1 Overview 1.2 Cloud definition 1.3 Cloud evolution 1.4 Cloud services 1.5 Cloud deployment types 1.6 Main challenges of Clouds 1.7 Summary 1.8 Exercises Part One Cloud management 2 Cloud Structure 2.1 Introduction 2.2 Infrastructure components 2.3 Cloud Layers 2.4 Cloud relations 2.5 Cloud dynamics 2.6 Data types 2.7 Summary 2.8 Exercises 3 Fundamentals of Cloud management 3.1 Introduction 3.2 Clouds management services 3.3 Virtual control center 3.4 Prerequisite input-data for the management services 3.5 Management of user requirements 3.6 Summary 3.7 Exercises 4 Cloud properties 4.1 Introduction 4.2 Adaptability property 4.3 Resilience property 4.4 Scalability property 4.5 Availability property 4.6 Reliability property 4.7 Security and privacy property 4.8 Business model 4.9 Summary 4.10 Exercises 5 Automated management services 5.1 Introduction 5.2 Virtual layer self-managed services 5.3 Virtual services interdependency 5.4 Application layer self-managed services 5.5 Application services interdependency 5.6 Security and privacy by design 5.7 Multi-tier application deployment in the Cloud 5.8 Main challenges and requirements 5.9 Summary 5.10 Exercises Part Two Clouds security fundamentals 6 Background 6.1 Topics flow 6.2 Trusted Computing 6.3 Summary 7 Challenges for establishing trust in Clouds 7.1 Introduction 7.2 Effects of Cloud dynamism on trust relationships 7.3 Challenges 7.4 Summary 7.5 Exercises 8 Establishing trust in Clouds 8.1 Introduction 8.2 Organization requirements 8.3 Framework requirements 8.4 Device properties 8.5 Framework architecture 8.6 Required software agents 8.7 Framework workflow 8.8 Discussion and analysis 8.9 Summary 8.10 Exercises 9 Clouds chains of trust 9.1 Introduction 9.2 Software agents revision 9.3 Roots of and chains of trust definition 9.4 Intra-layer chains of trust 9.5 Trust across layers 9.6 Summary 9.7 Exercises 10 Provenance in Clouds 10.1 Introduction 10.2 Motivating scenarios 10.3 Log records management and requirements 10.4 Framework domain architecture 10.5 Framework software agents 10.6 Framework workflow 10.7 Threat analysis 10.8 Discussion and future directions 10.9 Exercises 11 Insiders 11.1 Introduction 11.2 Insiders definition 11.3 Conceptual models 11.4 Summary 11.5 Exercises Part Three Practical examples 12 Real life examples 12.1 Open Stack 12.2 Amazon web services 12.3 Component architecture 12.4 Prototype 12.5 Summary 13 Case Study 13.1 Scenario 13.2 Home healthcare architecture in the Cloud 13.3 Insiders analysis for home healthcare 13.4 Cloud threats
506 _aAvailable to OhioLINK libraries.
520 _a"This book discusses the foundations of Cloud computing, and covers in detail two main aspects of Cloud computing"--
_cProvided by publisher.
650 0 _aCloud computing.
650 0 _aWeb services.
_9970
650 0 _aComputer security.
655 4 _aElectronic books.
710 2 _aOhio Library and Information Network.
730 0 _aWiley online library.
_5OCU.
730 0 _aWiley InterScience ebooks.
_5OCU.
776 0 8 _iPrint version:
_aAbbadi, Imad M., author.
_tCloud management and security
_dChichester, West Sussex ; Hoboken, NJ : Wiley, 2014
_z9781118817094
_w(DLC) 2014011409.
856 4 0 _3Wiley Online Library :
_uhttp://dx.doi.org/10.1002/9781118817087
_zConnect to resource online
856 4 0 _3Wiley Online Library :
_uhttp://proxy.ohiolink.edu:9099/login?url=http://dx.doi.org/10.1002/9781118817087
_zConnect to resource online (Off Campus Access)
942 _2ddc
_cBK